802.1q tagged VLANs are supported for traffic segmentation as well as client identification. Individual device ports mapped into VLANs can be used as method for identification for portal segmentation and billing purposes. All 4096 VLAN IDs are supported in the implementation, and they use VLAN types to determine traffic handling.
A device that allows users with wireless access to connect to a wireless network.
A list of valid devices IP addresses present on the network(s). When network device sees an ARP (known IP address, unknown MAC address) for one of the devices that do not respond because there is a device on the network, it will legitimately respond. Add to the ARP exclusion list non-client, IP-based network devices that share a common layer 2 environment with the network device. The IP addressing used by these devices should not be part of the Subscriber Network or DHCP scope.
Table that displays current active ARP entries on the device.
The maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
Identical in function to SNMP RFC 1493 Port mapping except for the SNMP query sent to the network device. Instead of RFC 1493 based implementation, a proprietary enterprise MIB is queried to extract the port information.
A logical area in a computer network where any computer connected to the computer network can directly transmit to any other in the domain without having to go through a routing device.
A command line interface.
CMTS DHCP Scope configuration is specifically for configuring DHCP services for cable modems.
Logical area in a computer network where data packets can “collide” with one another.
A utility that allows for retrieval of the entire device’s configuration via a text file. The text file can be copied out of the device for purposes of backup or configuration automation.
A utility that allows for uploading an entire device’s configuration via a text file. The text file can be imported in whole or specific lines can be manipulated.
A file format that has fields separated by a comma.
The target IP address or network where the data is moving towards.
Managed or unmanaged network devices (routers, switches, modems, etc.).
Communications protocol that lets network administrators manage centrally and automate the assignment of Internet Protocol (IP) addresses in an organization’s network.
Displays the current active DHCP leases.
Leases based upon product or account duration.
A server in a network or Internet service that assigns IP addresses to the multiple stations on the network.
Temporary DHCP Leases that are used to modify DHCP assignments to subscribers as needed for product based functionality. The temporary lease time is configurable and only applicable to non-active subscribers. (Users not listed as active in the billing table.)
Global NAT disablement allows for configuring routable IP addresses into the DHCP scope and overriding any NAT product type to route the client IP addresses with no translation.
A server used to translate between domain names and IP addresses. DNS servers translate names, such as xyz.com, into the numeric IP address that the Internet uses to send and receive information.
A process of performing a DNS Update to add, modify, or delete DNS resource records on the dynamically without reloading the entire DNS zone master file.
Data in the billing table can be downloaded from the device in the form of a comma separated values (CSV) file for purposes of integration into an external system or application.
Support users configure to redirect all HTTP based traffic to an upstream proxy server IP address and port. Used in situations where all Internet access is forced through proxy servers.
A configuration to redirect (via HTTP) a client’s post authentication to a desired URL.
Provides a traffic filter on the inside, outside, specific VLAN(s) or all VLANS (VLAN+) interfaces.
A very common method of transferring one or more files.
A generic XML connector for pre and post redirect options.
Textual name given to the Network Device device.
Underlying protocol that defines how messages are formatted and transmitted, and what actions Web servers and browsers would take in response to various commands.
Underlying protocol designed to transmit individual messages securely over the World Wide Web (www).
A commonly used device for connecting multiple computers or segments of a LAN together.
Extension to the IP defined by RFC 792. Supports packets containing error, control, and informational messages.
Utility to provide ICMP ping and trace route functionality. This functionality is applicable both upstream and downstream of the device.
Determines if an access account/code can be utilized more than one time. When the idle timeout is disabled, the account/code until the duration expires. If the idle timeout is enabled and a user is idled out of the system, the remaining (unused) time attributed to the account/code will be available for re-use by the subscriber. The account/code will be able to be used for sign up purposes until it is such that all available time on the account/code has been used. Once an account/code has no duration available to it the account/code cannot be used for sign up purposes again.
The traffic direction with respect to the selected interface. Any traffic moving towards the respective Interface.
The destination interface for all Subscriber LAN traffic. Subscriber LAN traffic is routed via the inside interface before reaching its targeted destination on the WAN or Subscriber LAN.
A utility that shows all interfaces to a device (both physical and virtual). Displays packet and error counters for each listed interface.
Internal redirection is configured to redirect (via HTTP) a client’s post authentication to a desired HTML file internal to the Network Device network.
LDAP Authentication will allow for authorization of clients by the device via an external LDAP server.
Local Authentication is a local list of usernames and passwords used for the purposes of authentication. There is no limit to the number of local authentication accounts that can be created.
Long Range Ethernet – Technology used to extender the reach of standard 802.3 Ethernet beyond 328ft or 100m.
A hardware address of a device.
A configurable list of MAC addresses that specifically allows or denies access through the unit.
A default VLAN which encompasses non-subscriber traffic such as managed network devices. Non-Subscriber devices must be configured on a management IP subnet, with the configured gateway and subnet listed as the secondary inside interface, to allow for layer 3 route propagation.
Identical in function to SNMP RFC 1493 Port mapping except for the SNMP query sent to the network device. Instead of RFC 1493 based implementation, a proprietary enterprise MIB is queried to extract the port information.
The traffic direction with respect to the selected interface. Any traffic moving away from the respective interface.
A type of network address translation which allows LAN users to keep their IP address private when communicating via the internet.
Program used to test reachability of destinations by sending them an ICMP echo request and waiting for a reply.
IP Port Bindings are used for managing devices on the internal (inside) network of the Network Device from the external (outside) network. TCP or UDP ports can be exported from the public IP address and mapped to any internal IP address and port.
Descriptive fields used for display purposes in the billing table. Any information configured in this field is displayed in the port column in all billing tables.
Port numbers represent an endpoint, or channel, for network communications. Port numbers allow different applications on the same computer to utilize network resources without interfering with each other. They are also a conduit for internet viruses to propagate from one device to another. In IP networking, port numbers can theoretically range from 0 to 65535.
Portal Groups associate various configuration elements for the purposes of presentation and limitation to what clients of the system can see or use.
A 3 character (alpha only) prefix to the 6 digit authentication code that is generated. This allows administrators of the system to identify the type of code by the prefix.
A WAN IP required to be configured on the Network Device for routed IP layer access.
A product type that assigns public (non-NAT’d) IP addresses to those clients that select a product with this IP type. The assignment happens via DHCP and requires the use of a temporary DHCP lease.
A device that forwards packets from one network to another based on addressing information.
Displays the current routing table of the device with a mechanism to delete non-critical system routes.
A format for sending e-mail messages between servers.
SMTP filter is configured to limit the number of messages a particular client can send over the specified duration of time.
A process of a system contacting a Mail Host to send mail to other systems using the standard mail protocols.
A set of protocols used to manage networks.
Allowed SNMP based network source.
Read only based SNMP community string.
SNMP Port Mapping functionality exists to have a mechanism to query network devices in a standard method with the MAC address of a client for the purposes of determining their location on the network.
The IP address or node on a network from where the data originates from.
PAT (Port Address Translation) mapping from the client’s IP address to the public (Outside) IP address of the device.
The IP address remains fixed and unique after each login.
Static IP mapping is a one to one mapping from the client’s IP address to a public IP address configured in the Static IP table. Also applicable to local static IP assignments on network devices.
Used to determine what subnet an IP address resides within. The mask is the specified network hosts corresponding to the IP address.
A device that filters and forwards packets through the network.
Protocol designed to interconnect a variety of computer equipment.
Utility allows for uploading files that will be available for retrieval via the device’s TFTP server. Files can be deleted from this manager as well.
utility that enables users to send and trace a packet to an Internet host to determine the route the packet takes.
Transparent proxy support is implemented to provide HTTP based proxy services for those clients configured for proxy.
Connectionless transport protocol that runs on top of TCP.
Utility allows for updating the firmware on the device. The firmware is downloaded via a FTP server into the device. The md5sum for the file must be supplied at the time of the download. The downloaded file will have an md5sum generated locally on the device and then compared to the supplied md5sum for verification of file validity.
Destination interface for all Subscriber LAN traffic originating from that specific VLAN.
Allows or disallows communications between users on different VLANs. When this feature is disabled clients are able to pass traffic with one another as if it was a flat network. When enabled no VLAN to VLAN routing of traffic is allowed, preventing any client in a VLAN communicating with a client in a different VLAN.
Selection to denote all configured VLANs.
A Logical representation of a traditional LAN sharing all of the characteristics of a LAN without the physical restrictions. It allows having hosts in disparate physical locations to be in the same VLAN segment and share their broadcast domain and provide direct IP connectivity.
A list of IP Address and/or domains that clients of the device have access without any authorization or redirection required. These entries can be in IP address form or fully qualified domain name form. A subnet field is configurable for denoting whether access to a single IP address or a subnet is allowed.
Network Device Web Administration interface.
Allows for the storage of a cookie on the client machine’s browser for the purposes of identification in the event of a MAC address change. This identification allows for allowing the client access without re-authenticating through the portal.
A collection of Internet servers consisting of billions of documents with hyperlinks to other documents.
We Are More Than Happy to Listen To Your Specific Project Needs.
Enable-IT Guarantees Your e-Mail Privacy 100%
Your Information Is Never Shared Or Sold.